Skip to main content

High-throughput secure reliable multicast protocol

Publication ,  Journal Article
Malkhi, D; Reiter, M
Published in: Journal of Computer Security
January 1, 1997

A (secure) reliable multicast protocol enables a process to multicast a message to a group of processes in a way that ensures that all honest destination-group members receive the same message, even if some group members and the multicast initiator are maliciously faulty. Reliable multicast has been shown to be useful for building multiparty cryptographic protocols and secure distributed services. We present a high-throughput reliable multicast protocol that tolerates the malicious behavior of up to fewer than one-third of the group members. Our protocol achieves high throughput using a novel technique for chaining multicasts, whereby the cost of ensuring agreement on each multicast message is amortized over many multicasts. This is coupled with a novel flow-control mechanism that yields low multicast latency.

Duke Scholars

Published In

Journal of Computer Security

DOI

ISSN

0926-227X

Publication Date

January 1, 1997

Volume

5

Issue

2

Start / End Page

113 / 127

Related Subject Headings

  • Computation Theory & Mathematics
  • 0803 Computer Software
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Malkhi, D., & Reiter, M. (1997). High-throughput secure reliable multicast protocol. Journal of Computer Security, 5(2), 113–127. https://doi.org/10.3233/JCS-1997-5203
Malkhi, D., and M. Reiter. “High-throughput secure reliable multicast protocol.” Journal of Computer Security 5, no. 2 (January 1, 1997): 113–27. https://doi.org/10.3233/JCS-1997-5203.
Malkhi D, Reiter M. High-throughput secure reliable multicast protocol. Journal of Computer Security. 1997 Jan 1;5(2):113–27.
Malkhi, D., and M. Reiter. “High-throughput secure reliable multicast protocol.” Journal of Computer Security, vol. 5, no. 2, Jan. 1997, pp. 113–27. Scopus, doi:10.3233/JCS-1997-5203.
Malkhi D, Reiter M. High-throughput secure reliable multicast protocol. Journal of Computer Security. 1997 Jan 1;5(2):113–127.

Published In

Journal of Computer Security

DOI

ISSN

0926-227X

Publication Date

January 1, 1997

Volume

5

Issue

2

Start / End Page

113 / 127

Related Subject Headings

  • Computation Theory & Mathematics
  • 0803 Computer Software